Implementations of cryptographic modules, Other Subject

Implementations-

Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented in firmware, hardware, software, or any grouping thereof. The exact implementation may depend on a number of factors such as the environment, the technology, used application, etc. Implementations which may comply with this usual include electronic devices (e.g., VLSI chip packages), micro- processors using Read Only Memory (ROM), Programmable Read Only Memory (PROM), or Electronically Erasable Read Only Memory (EEROM), and mainframe computers using Random-access Memory (RAM). When the algorithm is implemented in firmware or software, the processor on which the algorithm implements must be specific as part of the legalization process. Implementations of the algorithm which are validated and tested by NIST will be measured as complying with the standard. Note that FIPS 140-1 places additional requirements on cryptographic

Modules for Government use. Information regarding devices that have been  procedures and  validated for testing and validating equipment for conformance with this standard and FIPS 140-1 are existing from the National Institute of Standards and Technology, Computer Systems Laboratory, Gaithersburg, MD 20899.

Posted Date: 10/12/2012 8:44:08 AM | Location : United States







Related Discussions:- Implementations of cryptographic modules, Assignment Help, Ask Question on Implementations of cryptographic modules, Get Answer, Expert's Help, Implementations of cryptographic modules Discussions

Write discussion on Implementations of cryptographic modules
Your posts are moderated
Related Questions
What is Baroque Art? In fine art, the term Baroque (derived from the Portuguese 'barocco' meaning, 'irregular pearl or stone') define a rather complex idiom, originating in Rom

1. Give some suggestions to improve the Government and Public Relations.

Fossil fuels Ken Boyd received a Bachelor's and a Master's degree in geology from Rensselaer Polytechnic Institute in Troy, N.Y. He worked for both Gulf Oil and Marathon Oil

Ask qThe right to an education is a basic right belonging to all children. The UN Convention on the Rights of the Child enshrines this notion in Articles 28 and 29. And yet it seem

Memory representations (schemas) that enable efficient coding of long- term memories; only the most significant details of a given life event need to be encoded as upon retrieval t


Applicability- This standard may be used by Federal departments and agencies when the following conditions apply: 1.   A certified official or manager liable for data secur

what is on the license plate and why

Question: (a) Examine the extent to which the participatory role of the community needs the "mapping" of various groups as they will be identified and the support mechanisms,

Feminist research method: Feminist Method is a means of conducting of scientific investigations and generating theory from an explicitly Feminist Standpoint. Feminist methodologie